From 031b9ba1b4d6d7aa6ba436cd3c4209b965947e28 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Sat, 11 Feb 2023 10:29:02 +0530 Subject: [PATCH] Update CVE-2020-10770.yaml --- cves/2020/CVE-2020-10770.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2020/CVE-2020-10770.yaml b/cves/2020/CVE-2020-10770.yaml index b414b463d0..4177c0adca 100644 --- a/cves/2020/CVE-2020-10770.yaml +++ b/cves/2020/CVE-2020-10770.yaml @@ -1,7 +1,7 @@ id: CVE-2020-10770 info: - name: Keycloak <= 12.0.1 - request_uri blind Server-Side Request Forgery (SSRF) + name: Keycloak <= 12.0.1 - request_uri Blind Server-Side Request Forgery (SSRF) author: dhiyaneshDk severity: medium description: Keycloak 12.0.1 and below allows an attacker to force the server to request an unverified URL using the OIDC parameter request_uri. This allows an attacker to execute a server-side request forgery (SSRF) attack.